Avoiding Privacy Pitfalls When Using Big Data in MarketingTokusoudeka
The document discusses best practices for using big data in marketing campaigns while avoiding privacy issues. It provides an overview of emerging technologies and the exponential growth of minable data. It also examines consumer attitudes toward data privacy and sharing. The document then reviews applicable privacy laws and regulations, such as the Video Privacy Protection Act, Fair Credit Reporting Act, Gramm-Leach-Bliley Act, and others. It emphasizes that marketers should have a "culture of compliance" and considers practical examples of connecting different data sources like email and display advertising while protecting privacy.
This document provides an overview of internet application business models and regulatory issues. It discusses the rapid growth of internet usage globally and the rise of major internet companies. It also covers the classification of different internet applications and common use cases. The document examines key regulatory issues around security, effects on telecom business models, and national security concerns. It concludes with recommendations for regulators on how to best govern internet applications.
The document provides an overview of the successes of the first year of the eGovernment partnership between the Wisconsin Interactive Network (WIN) and the state of Wisconsin. Some key accomplishments include launching 21 services, including 5 mobile apps, 9 participating agencies, and handling over 29,000 customer support requests. Looking ahead, WIN plans to launch more services and mobile apps in 2015 and revamp some agency websites.
The document also summarizes some specific services launched in the first year, including an online and phone deer harvest registration system for the Department of Natural Resources that has registered over 10,000 deer, and two mobile apps related to fishing/wildlife and state parks that have been downloaded over 100,000 times total. It also discusses
This document summarizes innovations in Utah's online government services. It discusses new exam software that allows agencies to create customizable online exams. It also discusses how mobile access is increasingly important as over 90% of Americans now have smartphones. The document also advises not to rush security breach notifications and to thoroughly investigate before sharing information to avoid providing inaccurate details. It highlights how Utah's online services have saved $46 million over five years through lower costs compared to offline services.
NIC Inc., Tennessee Division, 2015 Annual ReportNIC Inc | EGOV
The document summarizes the 15-year partnership between NIC and the state of Tennessee to develop and manage online government services on TN.gov. It discusses how over 15 million transactions and $6 billion are processed annually through TN.gov applications. It also highlights new services launched, awards received, and increasing mobile traffic to the site.
The International Chiropractors Association (ICA) adopted Voter Connect to manage its advocacy operations and saw major growth, expanding its membership from 4,500 to 18,700 over 3 years. Voter Connect mobilized existing members' social networks and simplified message management. It also boosted participation on action alerts 800% by streamlining the process for advocates to contact legislators. These changes helped the ICA gain more attention from legislators and grow its revenue and membership.
The document summarizes proposed changes to Section 79 of India's Information Technology Act regarding regulating online content. It discusses draft rules that would require social media platforms like WhatsApp, Facebook, and Twitter to remove unlawful content, trace the origin of information, and deploy tools to identify such content. The draft also mandates data localization, increases record keeping timelines, and allows government orders to access data/assistance. While it aims to curb fake news and increase accountability, critics argue it could infringe privacy and be misused for political goals.
Joint ad trade letter to ag becerra re ccpa 1.31.2019Greg Sterling
We strongly support the objectives of the California Consumer Privacy Act (CCPA), but we have notable concerns around the likely negative impact on California consumers and businesses from some of the specific language in the law. We provide this initial comment to provide you with information about the significant importance of a data-driven and ad-supported online ecosystem, industry efforts to protect privacy, and in section III of the letter draw your attention to several areas that can be addressed and improved through the rulemaking process. We will provide more detailed comments over the coming weeks.
Avoiding Privacy Pitfalls When Using Big Data in MarketingTokusoudeka
The document discusses best practices for using big data in marketing campaigns while avoiding privacy issues. It provides an overview of emerging technologies and the exponential growth of minable data. It also examines consumer attitudes toward data privacy and sharing. The document then reviews applicable privacy laws and regulations, such as the Video Privacy Protection Act, Fair Credit Reporting Act, Gramm-Leach-Bliley Act, and others. It emphasizes that marketers should have a "culture of compliance" and considers practical examples of connecting different data sources like email and display advertising while protecting privacy.
This document provides an overview of internet application business models and regulatory issues. It discusses the rapid growth of internet usage globally and the rise of major internet companies. It also covers the classification of different internet applications and common use cases. The document examines key regulatory issues around security, effects on telecom business models, and national security concerns. It concludes with recommendations for regulators on how to best govern internet applications.
The document provides an overview of the successes of the first year of the eGovernment partnership between the Wisconsin Interactive Network (WIN) and the state of Wisconsin. Some key accomplishments include launching 21 services, including 5 mobile apps, 9 participating agencies, and handling over 29,000 customer support requests. Looking ahead, WIN plans to launch more services and mobile apps in 2015 and revamp some agency websites.
The document also summarizes some specific services launched in the first year, including an online and phone deer harvest registration system for the Department of Natural Resources that has registered over 10,000 deer, and two mobile apps related to fishing/wildlife and state parks that have been downloaded over 100,000 times total. It also discusses
This document summarizes innovations in Utah's online government services. It discusses new exam software that allows agencies to create customizable online exams. It also discusses how mobile access is increasingly important as over 90% of Americans now have smartphones. The document also advises not to rush security breach notifications and to thoroughly investigate before sharing information to avoid providing inaccurate details. It highlights how Utah's online services have saved $46 million over five years through lower costs compared to offline services.
NIC Inc., Tennessee Division, 2015 Annual ReportNIC Inc | EGOV
The document summarizes the 15-year partnership between NIC and the state of Tennessee to develop and manage online government services on TN.gov. It discusses how over 15 million transactions and $6 billion are processed annually through TN.gov applications. It also highlights new services launched, awards received, and increasing mobile traffic to the site.
The International Chiropractors Association (ICA) adopted Voter Connect to manage its advocacy operations and saw major growth, expanding its membership from 4,500 to 18,700 over 3 years. Voter Connect mobilized existing members' social networks and simplified message management. It also boosted participation on action alerts 800% by streamlining the process for advocates to contact legislators. These changes helped the ICA gain more attention from legislators and grow its revenue and membership.
The document summarizes proposed changes to Section 79 of India's Information Technology Act regarding regulating online content. It discusses draft rules that would require social media platforms like WhatsApp, Facebook, and Twitter to remove unlawful content, trace the origin of information, and deploy tools to identify such content. The draft also mandates data localization, increases record keeping timelines, and allows government orders to access data/assistance. While it aims to curb fake news and increase accountability, critics argue it could infringe privacy and be misused for political goals.
Joint ad trade letter to ag becerra re ccpa 1.31.2019Greg Sterling
We strongly support the objectives of the California Consumer Privacy Act (CCPA), but we have notable concerns around the likely negative impact on California consumers and businesses from some of the specific language in the law. We provide this initial comment to provide you with information about the significant importance of a data-driven and ad-supported online ecosystem, industry efforts to protect privacy, and in section III of the letter draw your attention to several areas that can be addressed and improved through the rulemaking process. We will provide more detailed comments over the coming weeks.
This document outlines self-regulatory principles for online behavioral advertising. It includes 7 principles: Education, Transparency, Consumer Control, Data Security, Material Changes, Sensitive Data, and Accountability. The principles aim to foster transparency, knowledge and choice for consumers regarding the collection and use of data for online behavioral advertising. They apply broadly across various entities involved in online advertising and require enhanced notice and choice mechanisms to inform consumers about data collection and allow them to exercise control over the use of their data. The principles seek to balance relevant advertising with protecting consumer information and preferences.
This document discusses issues around personal privacy and data collection online. It argues that individuals have a reasonable expectation of privacy in communications, and that corporations collecting user data have a responsibility to protect privacy. While targeted advertising supports free services, user data could also be misused. The document proposes that services could implement privacy protections like encryption by default to give users informed consent over how their data is used and ensure data security. Balancing privacy concerns with the need for advertising revenue models is complex, but modern users increasingly demand stronger privacy controls from online corporations.
Time to slow down? Measured respondes to the fake news crisismrleiser
A copy of my slides from the annual law and technlogy conference BILETA (British, Irish, Law, Education, and Technology Association) From 2018 in Aberdeen, Scotland
The Impact and Use of Social Media in PharmacovigilanceCovance
This white paper examines how the influence and reach of the internet and social media can be harnessed to drive valuable outcomes for the PV industry. In this paper, we look at available regulatory guidelines, current state and future considerations for use of social media in PV, possible areas of influence, expected challenges, potential solutions and next steps.
CCPA is set to be the most comprehensive privacy law to date in the US and aims to give Californians more control over their personal information.
During my work at Criteo, I'm in charge of CCPA project from initialisation, planification to answer to the clients questions.
Furthermore, I took specific actions including training program, One pager and Q&A edition, as well as cooperation with other departments, such as marketing, law and sales teams.
Online Behavioral Advertising (OBA) Legal & Regulatory ComplianceAdler Law Group
Online behavioral advertising involves the collection of data about individuals' online activities in order to deliver targeted advertisements. While this allows for personalized ads, many users are concerned about privacy and a lack of anonymity online. Both regulators and legislators have responded by introducing laws and guidelines to increase transparency, consent, and security around the collection and use of personal data for behavioral advertising. Industry groups have also developed self-regulatory principles, but enforcement of these is ongoing.
he Contract for the Web was created by representatives from over 80 organizations, representing governments, companies and civil society, and sets out commitments to guide digital policy agendas. To achieve the Contract’s goals, governments, companies, civil society and individuals must commit to sustained policy development, advocacy, and implementation of the Contract text.
Policy Brief : Can the GDPR help SMEs innovate for older adults in Europe?Mobile Age Project
This document discusses how the GDPR affects the use of personal data to provide services to older adults, particularly in rural areas. It notes that while AI and data collection can enable new services, obtaining valid consent and protecting privacy can be challenging. It recommends further research on improving consent processes, anonymizing data when shared with third parties, and exploring how SMEs can gain access to data and compete in the market for online services.
The document provides an overview of FINRA regulations regarding the use of social media by financial services firms and member organizations. It summarizes perspectives from FINRA and industry members on key issues such as:
1) Whether social media communications should be considered a new category of "Interactive Electronic Communications" separate from existing categories like advertisements or correspondence.
2) Responsibility for third-party content shared or displayed on social media pages controlled by member firms.
3) How member firms should supervise employees' personal use of social media given that most social platforms are outside the firms' direct control.
The document analyzes these perspectives and also provides context on social media usage statistics. It aims to help align FIN
The document summarizes the ongoing debate around data retention legislation in the European Union. It discusses two proposals - a directive from the European Commission and a framework decision from some EU Council members, including the UK. It outlines the types of data proposed to be retained, including IP addresses, user IDs, connection labels/phone numbers, names and addresses of subscribers. It also discusses concerns raised around costs to ISPs, data storage requirements, and potential economic impacts.
The Vision & Value of a Connected_GovernmentAllCloud
With the right partner, government organizations can take advantage of everything the digital world has to offer –
technology to connect people to government in innovative new ways – improving the delivery of services while building a
more intimate connection with citizens.
For 14 years, Salesforce has been a driver for enterprise cloud computing. Salesforce has mapped out the strategy and
guided many government partners through this terrain already. Now, let us guide you.
Go to citizen.agency for more real world case studies of innovation in action: https://www.citizen.agency/
Smarsh social media trends, insights, and best practices from 2015 compliance...Smarsh
-Key trends identified in the 2015 Electronic Communications Compliance Survey
-What these trends mean for users, firms and compliance professionals
-Best Practices for managing social media compliance
(public) Smart Cities How the Internet is Changing the Way Local Governments...Sharie Blanton
1. The document discusses how internet technologies are changing citizen engagement with local government. Open data initiatives and internet of things technologies provide new opportunities for citizens to access information and provide feedback that can improve services.
2. Citizen hacktivists are now analyzing open government data to develop policy recommendations and identify budgeting priorities. Technologies like smart parking and gunshot detection sensors provide data that can help governments optimize services.
3. Greater connectivity through internet of things devices and open data platforms can allow governments to be more proactive in addressing issues. However, challenges remain in fully engaging groups without internet access or language barriers.
Emerging Privacy Themes That Will Impact Your CompanyIAB Canada
Adam Kardash of Osler, Hoskin & Harcourt LLP spoke about emerging privacy themes that companies should be paying attention to at our MIXX conference held on March 20, 2014.
Presentazione di Antonio Cordella al seminario "E-Government: Teorie e Pratiche nei Paesi Maturi e in via di Sviluppo"
www.thinkinnovation.org
www.forumpa.it
Impacts of Open Data Standards on Transparency Tools - Khairil Yusof (Sinar P...mysociety
This was presented by Khairil Yusof (Sinar Project) and Soe Lin Htoot (Myanmar Fifth Estate), at the Impacts of Civic Technology Conference (TICTeC@Taipei) in Taipei on 12th September 2017. You can find out more information about the conference here: http://civictechfest.org/agenda
Abstract:
Most Open Data initiatives assume the provision of data by governments which will then be picked up and used by a variety of sectors for the good of all.
But for countries with opaque governments, or whose NGOs lack technical capacity, the promises of Open Data will fall far short of the reality.
This active research shows how adopting Open Data standards for government data helps civil society organizations collaborate in building usable Open Data sets for transparency, governance — and tools that increase participation by citizens.
And for those in places where government do not reliably release Open Data, discover how to source unstructured data by other means. Finally, Khairil discusses the contrasting impacts and uses of this approach in the two different environments of Malaysia and Myanmar.
Information technology (intermediary guidelines and digital media ethics code...ZahidManiyar
The document summarizes new guidelines for social media and digital media platforms in India. Key points:
- The rules aim to make social media and digital media platforms more accountable for content on their sites and provide grievance redressal mechanisms for users.
- Major platforms like WhatsApp, YouTube, Facebook and Twitter have large user bases in India but need to comply with Indian laws and the constitution.
- The rules establish due diligence requirements for platforms and require grievance officers to resolve complaints within 15 days.
- Platforms must remove content involving nudity, impersonation or privacy violations within 24 hours of complaints.
- The rules distinguish requirements for smaller and larger social media platforms based on
Writing Sample - G. Chaffin - Client Mock-upGordon Chaffin
The document provides sample communications for a hypothetical non-profit organization, Connect to Prosper, to use during a "Week of Web Action" advocating for greater regulation of broadband internet access. The sample materials include:
1) Two draft emails to be sent to CTP's supporter lists, one general and one targeted at constituents of key Congressional committee members, urging them to take action before an upcoming vote.
2) Sample social media posts for Twitter and Facebook promoting the Week of Web Action and encouraging supporters to contact their representatives.
3) Background on the issue and hypothetical scenario setting up the need for the advocacy campaign in the lead up to a Congressional committee vote that could reclassify broadband as a public utility
Government as a platform: engaging the public with social mediaPatrick McCormick
The document discusses the use of social media by governments to engage with the public. It outlines how citizens' expectations are changing with new technologies and the internet, requiring governments to also change how they operate. Governments need to embrace new tools and become more transparent, collaborative platforms to build trust with the public. The presentation provides examples from the government of Victoria, Australia of how social media is being used for emergency response, public engagement and improving access to government services and information.
This document outlines self-regulatory principles for online behavioral advertising. It includes 7 principles: Education, Transparency, Consumer Control, Data Security, Material Changes, Sensitive Data, and Accountability. The principles aim to foster transparency, knowledge and choice for consumers regarding the collection and use of data for online behavioral advertising. They apply broadly across various entities involved in online advertising and require enhanced notice and choice mechanisms to inform consumers about data collection and allow them to exercise control over the use of their data. The principles seek to balance relevant advertising with protecting consumer information and preferences.
This document discusses issues around personal privacy and data collection online. It argues that individuals have a reasonable expectation of privacy in communications, and that corporations collecting user data have a responsibility to protect privacy. While targeted advertising supports free services, user data could also be misused. The document proposes that services could implement privacy protections like encryption by default to give users informed consent over how their data is used and ensure data security. Balancing privacy concerns with the need for advertising revenue models is complex, but modern users increasingly demand stronger privacy controls from online corporations.
Time to slow down? Measured respondes to the fake news crisismrleiser
A copy of my slides from the annual law and technlogy conference BILETA (British, Irish, Law, Education, and Technology Association) From 2018 in Aberdeen, Scotland
The Impact and Use of Social Media in PharmacovigilanceCovance
This white paper examines how the influence and reach of the internet and social media can be harnessed to drive valuable outcomes for the PV industry. In this paper, we look at available regulatory guidelines, current state and future considerations for use of social media in PV, possible areas of influence, expected challenges, potential solutions and next steps.
CCPA is set to be the most comprehensive privacy law to date in the US and aims to give Californians more control over their personal information.
During my work at Criteo, I'm in charge of CCPA project from initialisation, planification to answer to the clients questions.
Furthermore, I took specific actions including training program, One pager and Q&A edition, as well as cooperation with other departments, such as marketing, law and sales teams.
Online Behavioral Advertising (OBA) Legal & Regulatory ComplianceAdler Law Group
Online behavioral advertising involves the collection of data about individuals' online activities in order to deliver targeted advertisements. While this allows for personalized ads, many users are concerned about privacy and a lack of anonymity online. Both regulators and legislators have responded by introducing laws and guidelines to increase transparency, consent, and security around the collection and use of personal data for behavioral advertising. Industry groups have also developed self-regulatory principles, but enforcement of these is ongoing.
he Contract for the Web was created by representatives from over 80 organizations, representing governments, companies and civil society, and sets out commitments to guide digital policy agendas. To achieve the Contract’s goals, governments, companies, civil society and individuals must commit to sustained policy development, advocacy, and implementation of the Contract text.
Policy Brief : Can the GDPR help SMEs innovate for older adults in Europe?Mobile Age Project
This document discusses how the GDPR affects the use of personal data to provide services to older adults, particularly in rural areas. It notes that while AI and data collection can enable new services, obtaining valid consent and protecting privacy can be challenging. It recommends further research on improving consent processes, anonymizing data when shared with third parties, and exploring how SMEs can gain access to data and compete in the market for online services.
The document provides an overview of FINRA regulations regarding the use of social media by financial services firms and member organizations. It summarizes perspectives from FINRA and industry members on key issues such as:
1) Whether social media communications should be considered a new category of "Interactive Electronic Communications" separate from existing categories like advertisements or correspondence.
2) Responsibility for third-party content shared or displayed on social media pages controlled by member firms.
3) How member firms should supervise employees' personal use of social media given that most social platforms are outside the firms' direct control.
The document analyzes these perspectives and also provides context on social media usage statistics. It aims to help align FIN
The document summarizes the ongoing debate around data retention legislation in the European Union. It discusses two proposals - a directive from the European Commission and a framework decision from some EU Council members, including the UK. It outlines the types of data proposed to be retained, including IP addresses, user IDs, connection labels/phone numbers, names and addresses of subscribers. It also discusses concerns raised around costs to ISPs, data storage requirements, and potential economic impacts.
The Vision & Value of a Connected_GovernmentAllCloud
With the right partner, government organizations can take advantage of everything the digital world has to offer –
technology to connect people to government in innovative new ways – improving the delivery of services while building a
more intimate connection with citizens.
For 14 years, Salesforce has been a driver for enterprise cloud computing. Salesforce has mapped out the strategy and
guided many government partners through this terrain already. Now, let us guide you.
Go to citizen.agency for more real world case studies of innovation in action: https://www.citizen.agency/
Smarsh social media trends, insights, and best practices from 2015 compliance...Smarsh
-Key trends identified in the 2015 Electronic Communications Compliance Survey
-What these trends mean for users, firms and compliance professionals
-Best Practices for managing social media compliance
(public) Smart Cities How the Internet is Changing the Way Local Governments...Sharie Blanton
1. The document discusses how internet technologies are changing citizen engagement with local government. Open data initiatives and internet of things technologies provide new opportunities for citizens to access information and provide feedback that can improve services.
2. Citizen hacktivists are now analyzing open government data to develop policy recommendations and identify budgeting priorities. Technologies like smart parking and gunshot detection sensors provide data that can help governments optimize services.
3. Greater connectivity through internet of things devices and open data platforms can allow governments to be more proactive in addressing issues. However, challenges remain in fully engaging groups without internet access or language barriers.
Emerging Privacy Themes That Will Impact Your CompanyIAB Canada
Adam Kardash of Osler, Hoskin & Harcourt LLP spoke about emerging privacy themes that companies should be paying attention to at our MIXX conference held on March 20, 2014.
Presentazione di Antonio Cordella al seminario "E-Government: Teorie e Pratiche nei Paesi Maturi e in via di Sviluppo"
www.thinkinnovation.org
www.forumpa.it
Impacts of Open Data Standards on Transparency Tools - Khairil Yusof (Sinar P...mysociety
This was presented by Khairil Yusof (Sinar Project) and Soe Lin Htoot (Myanmar Fifth Estate), at the Impacts of Civic Technology Conference (TICTeC@Taipei) in Taipei on 12th September 2017. You can find out more information about the conference here: http://civictechfest.org/agenda
Abstract:
Most Open Data initiatives assume the provision of data by governments which will then be picked up and used by a variety of sectors for the good of all.
But for countries with opaque governments, or whose NGOs lack technical capacity, the promises of Open Data will fall far short of the reality.
This active research shows how adopting Open Data standards for government data helps civil society organizations collaborate in building usable Open Data sets for transparency, governance — and tools that increase participation by citizens.
And for those in places where government do not reliably release Open Data, discover how to source unstructured data by other means. Finally, Khairil discusses the contrasting impacts and uses of this approach in the two different environments of Malaysia and Myanmar.
Information technology (intermediary guidelines and digital media ethics code...ZahidManiyar
The document summarizes new guidelines for social media and digital media platforms in India. Key points:
- The rules aim to make social media and digital media platforms more accountable for content on their sites and provide grievance redressal mechanisms for users.
- Major platforms like WhatsApp, YouTube, Facebook and Twitter have large user bases in India but need to comply with Indian laws and the constitution.
- The rules establish due diligence requirements for platforms and require grievance officers to resolve complaints within 15 days.
- Platforms must remove content involving nudity, impersonation or privacy violations within 24 hours of complaints.
- The rules distinguish requirements for smaller and larger social media platforms based on
Writing Sample - G. Chaffin - Client Mock-upGordon Chaffin
The document provides sample communications for a hypothetical non-profit organization, Connect to Prosper, to use during a "Week of Web Action" advocating for greater regulation of broadband internet access. The sample materials include:
1) Two draft emails to be sent to CTP's supporter lists, one general and one targeted at constituents of key Congressional committee members, urging them to take action before an upcoming vote.
2) Sample social media posts for Twitter and Facebook promoting the Week of Web Action and encouraging supporters to contact their representatives.
3) Background on the issue and hypothetical scenario setting up the need for the advocacy campaign in the lead up to a Congressional committee vote that could reclassify broadband as a public utility
Government as a platform: engaging the public with social mediaPatrick McCormick
The document discusses the use of social media by governments to engage with the public. It outlines how citizens' expectations are changing with new technologies and the internet, requiring governments to also change how they operate. Governments need to embrace new tools and become more transparent, collaborative platforms to build trust with the public. The presentation provides examples from the government of Victoria, Australia of how social media is being used for emergency response, public engagement and improving access to government services and information.
Legal Obligations of Technology Service Providers as IntermediariesEquiCorp Associates
A database of millions of customers including their contact details are found freely accessible online and are available for sale at a very nominal price at various online social media platforms has brought a serious and basic question in focus- who all can be held responsible and accountable for such unauthorize and illegal acts?
Prima facie, the person who is selling the database is responsible under the eyes of law, but do the technology services providers or the platform where such database is been listed, owes any obligation to the customers and can be held responsible for unauthorized acts by a third party on their platform?
The intermediaries play a very important role in the enforcement of various provisions under the IT Act. In any technology services, there are multiple players involved in provision of services such as setting up web page or website, ISP providing internet connectivity, service provider for registration of domain name and hosting the domain, different service provider for uploading the web pages etc
The document discusses research on using ICT tools to improve governance and policy modeling. It proposes:
1) Developing advanced tools and new governance models to engage citizens and groups in policymaking through mass collaboration platforms.
2) Creating real-time opinion visualization and policy modeling based on simulating people's behavior and wishes to develop next-generation public services.
3) Building a participatory roadmap on ICT for governance and policy modeling through discussion.
The document discusses research on using ICT tools to improve governance and policy modeling. It proposes:
1) Developing advanced tools and new governance models to engage citizens and groups in policymaking through mass collaboration platforms.
2) Creating real-time opinion visualization, policy modeling, and next generation public services based on simulating people's behavior and wishes at large scales.
3) Building participative roadmaps on ICT for governance and policy modeling through discussion.
The document discusses research on using ICT tools to improve governance and policy making through increased citizen participation and modeling. It proposes:
1) Developing advanced tools and new governance models to engage citizens, groups, and communities in transparency and tracking policy inputs.
2) Using real-time opinion visualization, policy modeling, simulation, and mixed reality apps to model behaviors and wishes of large groups of people to improve public services.
3) Building on these ideas over time to achieve open and collaborative model-building based on massive data analysis and cloud computing to support more accurate and useful simulation tools and models.
GE_: eingetragene meine Kommentaeren zu pdf_files des EurOCouncil....giovanni Colombo
This document provides guidelines for states regarding the human rights impacts of algorithmic systems. It discusses how algorithmic systems can positively or negatively impact human rights, and outlines states' obligations to protect human rights in this context. The document recommends that states implement guidelines to ensure algorithmic systems are designed, developed and used in a way that respects human rights. It also calls on private sector actors to respect human rights in their use of algorithmic systems.
Unlock the definitive guide to managing your online tracking technology vendors effectively. This webinar delves into a comprehensive and actionable set of best practices that every organization needs. From meticulous website scans to in-depth contract reviews, from precise consent categorization to harmonizing diverse frameworks, our checklist ensures you cover all the crucial touchpoints. Equip yourself with this essential framework and confidently navigate the complex landscape of online tracking compliance, using our step-by-step roadmap as your trusted reference.
Join our panel of experts in the webinar as they equip you with the knowledge and strategies for navigating vendor relationships under CPRA.
2013 5-30 co e presentation matthijs van bergen net neutrality in the netherl...Matthijs Van Bergen
This document summarizes the key aspects of net neutrality in the Netherlands. It discusses how internet service providers were attempting to monetize control over content by blocking services like WhatsApp unless extra fees were paid, violating the separation between transport and application layers. The document also outlines the relevant Dutch law on net neutrality and provides a proposed model law. It emphasizes that measures interfering with internet access must be necessary and proportionate to aims like network management, and cannot be used to extract extra fees from users or favor certain services.
The document discusses EU directives on e-commerce and consumer rights in Belgium. The 2000 Electronic Commerce Directive established a framework for e-commerce in the EU internal market by harmonizing rules around transparency, commercial communications, contracts, and liability for intermediaries. The 2011 Consumer Rights Directive amended prior directives on consumer protection and sets rules for business-to-consumer contracts regarding required information, the right of withdrawal, and exceptions. The document also summarizes key Belgian laws implementing the EU directives, including the 2003 law on information society services and a 2013 law on consumer rights.
Emerging data sharing models to promote financial service innovation june 201...Rafael Mazer
This report reviews the growing number of models that allow consumers to manage their personal and financial information. The global scan also considers these models' viability in Kenya, Tanzania and Uganda.
The document is a letter submitted to the U.S. Securities and Exchange Commission providing comments on the SEC's 21st Century Disclosure Initiative. The letter recommends that the SEC mandate XBRL as the reporting standard and move towards continuous, machine-readable reporting of raw financial data. This would eliminate rendered reports and democratize access to information, giving all investors equal access to make better investment decisions. The letter also calls for expanded disclosure requirements and a culture of transparency and accountability among financial preparers.
Intermediary Accountability in the Digital AgeRichard Austin
Examination of the accountability of Internet Intermediaries with a focus on Online Reputation, Cambridge Analytica and Facebook and Competition issues
The Digital Services Act - soon in your countryKirsten Fiedler
The Digital Services Act aims to create uniform rules for digital services across the EU. It establishes tiered obligations for intermediary services, hosting services, online platforms, and very large online platforms. It aims to make the internet safer, combat disinformation, and address the impact of platforms. Very large platforms will face additional requirements like risk assessments, recommender system transparency, and data access for researchers. Enforcement will be coordinated by national Digital Services Coordinators and the EU Commission can impose fines up to 6% of global revenue on very large platforms.
The document discusses a study on tractor vibration and the ergonomic design of tractor seats. It examines how vibration affects tractor operators and aims to improve seat design to minimize health issues from prolonged vibration exposure. The study analyzes tractor vibrations, reviews existing research on vibration and health effects, and proposes ergonomic seat modifications to enhance operator comfort and reduce vibration transmission.
This presentation was presented at ICCIT2007.It was intended to give a plausible solution to implement e-governance upon agriculture sector of Bangladesh.
New it rules (presented by abhinav pathak)Abhinav Pathak
The document summarizes new IT rules introduced by the Indian government for social media platforms, OTT platforms, and digital news media. Key points include:
- Rules distinguish between regular and "significant" social media platforms based on user thresholds and impose additional due diligence on the latter.
- All platforms must have robust grievance redressal, publish compliance reports, and remove unlawful content promptly.
- Significant social media and messaging platforms must enable tracing of original senders for certain messages.
- OTT and digital news platforms face new regulations around content labeling and publisher code of conducts.
- Experts have raised concerns around privacy, encryption, and lack of legislative backing for regulating news media.
Similar to Search engines, news aggregators and intermediaries (20)
Presentation by Christian D'Cunha at the 2019 CMPF Summer School for Journalists and Media Practitioners - Covering Political Campaigns in the Age of Data, Algorithms & Artificial Intelligence
This document provides an overview of polls and discusses several key concepts related to interpreting and reporting on polls. It notes that polling error can be expected to be around 2-2.2 percentage points on average and discusses how to identify reliable polls based on factors like the source, sample size, and methodology. It also explains important polling concepts like margins of error, confidence intervals, and how a poll of polls can provide a more accurate picture than any single poll.
Presentation by Luc Steinberg at the 2019 CMPF Summer School for Journalists and Media Practitioners - Covering Political Campaigns in the Age of Data, Algorithms & Artificial Intelligence
Presentation by Ula Furgal at the 2019 CMPF Summer School for Journalists and Media Practitioners - Covering Political Campaigns in the Age of Data, Algorithms & Artificial Intelligence
Presentation by Samantha Bradshaw at the 2019 CMPF Summer School for Journalists and Media Practitioners - Covering Political Campaigns in the Age of Data, Algorithms & Artificial Intelligence
Presentation by Anna Herold at the 2019 CMPF Summer School for Journalists and Media Practitioners - Covering Political Campaigns in the Age of Data, Algorithms & Artificial Intelligence
Presentation by Bernd Holznagel at the 2019 CMPF Summer School for Journalists and Media Practitioners - Covering Political Campaigns in the Age of Data, Algorithms & Artificial Intelligence
Presentation by Damian Tambini at the 2019 CMPF Summer School for Journalists and Media Practitioners - Covering Political Campaigns in the Age of Data, Algorithms & Artificial Intelligence
Presentation by Federica Casarosa at the 2019 CMPF Summer School for Journalists and Media Practitioners - Covering Political Campaigns in the Age of Data, Algorithms & Artificial Intelligence
Presentation by Gabriela Jacomella at the 2019 CMPF Summer School for Journalists and Media Practitioners - Covering Political Campaigns in the Age of Data, Algorithms & Artificial Intelligence
Presentation by Wessel Reijers at the 2019 CMPF Summer School for Journalists and Media Practitioners - Covering Political Campaigns in the Age of Data, Algorithms & Artificial Intelligence
A presentation by Pier Luigi Parcu on Artificial Intelligence, elections, media pluralism and media freedom at the European Artificial Intelligence Observatory April 2, 2019
This document discusses media pluralism in Central and Eastern Europe based on a presentation by Dr. Václav Štětka. It finds that many countries in the region have seen declines in media freedom and pluralism in recent years. Common issues include high concentration of media ownership, lack of transparency, political influence over public media, and threats to editorial independence. Countries like Poland, Hungary and the Czech Republic are highlighted as having particularly concerning trends, such as political takeovers of public media and attempts to control independent outlets. Overall, illiberal populism is seen as a threat to journalists and trust in news media in the region. The document calls for the EU to do more to protect media pluralism and independence.
This document outlines the program for a conference on monitoring media pluralism in Europe. It discusses the Media Pluralism Monitor (MPM), which has assessed media pluralism in EU countries and others since 2014. The MPM uses a comprehensive questionnaire across four areas and 20 indicators to evaluate 200 variables from primary and secondary sources. It analyzes different types of legacy and digital media. A risk-based approach uses a traffic light system to indicate the level of risk to media pluralism in each country.
1) Economic consolidation in the digital advertising market poses a threat to media plurality as a small number of large tech companies like Google and Facebook dominate online advertising revenue.
2) Technological changes introduced by digital platforms could threaten quality of information by reducing the diversity of news sources and enabling the spread of disinformation.
3) The MPM 2020 project aims to update the existing Media Pluralism Monitor to better assess new digital-age risks to media plurality from factors like social media microtargeting, algorithmic news personalization, and filter bubbles.
UNESCO has developed the Internet Universality Indicators (IUIs) framework to assess national internet development environments. The IUIs are based on principles of Rights, Openness, Accessibility, and Multistakeholder participation. There are 303 indicators across 5 categories and 124 questions. The IUIs were endorsed by UNESCO's International Programme for the Development of Communication in 2018 to be used voluntarily by member states and stakeholders to conduct national internet assessments.
Presentation from Lubos Kuklis of ERGA (European Regulators Group for Audiovisual Media Services).
Presented at the 2018 CMPF Conference "Monitoring Media Pluralism - Between Old Risks and New Threats,"
More from Centre for Media Pluralism and Media Freedom (20)
A review of the growth of the Israel Genealogy Research Association Database Collection for the last 12 months. Our collection is now passed the 3 million mark and still growing. See which archives have contributed the most. See the different types of records we have, and which years have had records added. You can also see what we have for the future.
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...PECB
Denis is a dynamic and results-driven Chief Information Officer (CIO) with a distinguished career spanning information systems analysis and technical project management. With a proven track record of spearheading the design and delivery of cutting-edge Information Management solutions, he has consistently elevated business operations, streamlined reporting functions, and maximized process efficiency.
Certified as an ISO/IEC 27001: Information Security Management Systems (ISMS) Lead Implementer, Data Protection Officer, and Cyber Risks Analyst, Denis brings a heightened focus on data security, privacy, and cyber resilience to every endeavor.
His expertise extends across a diverse spectrum of reporting, database, and web development applications, underpinned by an exceptional grasp of data storage and virtualization technologies. His proficiency in application testing, database administration, and data cleansing ensures seamless execution of complex projects.
What sets Denis apart is his comprehensive understanding of Business and Systems Analysis technologies, honed through involvement in all phases of the Software Development Lifecycle (SDLC). From meticulous requirements gathering to precise analysis, innovative design, rigorous development, thorough testing, and successful implementation, he has consistently delivered exceptional results.
Throughout his career, he has taken on multifaceted roles, from leading technical project management teams to owning solutions that drive operational excellence. His conscientious and proactive approach is unwavering, whether he is working independently or collaboratively within a team. His ability to connect with colleagues on a personal level underscores his commitment to fostering a harmonious and productive workplace environment.
Date: May 29, 2024
Tags: Information Security, ISO/IEC 27001, ISO/IEC 42001, Artificial Intelligence, GDPR
-------------------------------------------------------------------------------
Find out more about ISO training and certification services
Training: ISO/IEC 27001 Information Security Management System - EN | PECB
ISO/IEC 42001 Artificial Intelligence Management System - EN | PECB
General Data Protection Regulation (GDPR) - Training Courses - EN | PECB
Webinars: https://pecb.com/webinars
Article: https://pecb.com/article
-------------------------------------------------------------------------------
For more information about PECB:
Website: https://pecb.com/
LinkedIn: https://www.linkedin.com/company/pecb/
Facebook: https://www.facebook.com/PECBInternational/
Slideshare: http://www.slideshare.net/PECBCERTIFICATION
This presentation was provided by Steph Pollock of The American Psychological Association’s Journals Program, and Damita Snow, of The American Society of Civil Engineers (ASCE), for the initial session of NISO's 2024 Training Series "DEIA in the Scholarly Landscape." Session One: 'Setting Expectations: a DEIA Primer,' was held June 6, 2024.
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Dr. Vinod Kumar Kanvaria
Exploiting Artificial Intelligence for Empowering Researchers and Faculty,
International FDP on Fundamentals of Research in Social Sciences
at Integral University, Lucknow, 06.06.2024
By Dr. Vinod Kumar Kanvaria
How to Build a Module in Odoo 17 Using the Scaffold MethodCeline George
Odoo provides an option for creating a module by using a single line command. By using this command the user can make a whole structure of a module. It is very easy for a beginner to make a module. There is no need to make each file manually. This slide will show how to create a module using the scaffold method.
हिंदी वर्णमाला पीपीटी, hindi alphabet PPT presentation, hindi varnamala PPT, Hindi Varnamala pdf, हिंदी स्वर, हिंदी व्यंजन, sikhiye hindi varnmala, dr. mulla adam ali, hindi language and literature, hindi alphabet with drawing, hindi alphabet pdf, hindi varnamala for childrens, hindi language, hindi varnamala practice for kids, https://www.drmullaadamali.com
A Strategic Approach: GenAI in EducationPeter Windle
Artificial Intelligence (AI) technologies such as Generative AI, Image Generators and Large Language Models have had a dramatic impact on teaching, learning and assessment over the past 18 months. The most immediate threat AI posed was to Academic Integrity with Higher Education Institutes (HEIs) focusing their efforts on combating the use of GenAI in assessment. Guidelines were developed for staff and students, policies put in place too. Innovative educators have forged paths in the use of Generative AI for teaching, learning and assessments leading to pockets of transformation springing up across HEIs, often with little or no top-down guidance, support or direction.
This Gasta posits a strategic approach to integrating AI into HEIs to prepare staff, students and the curriculum for an evolving world and workplace. We will highlight the advantages of working with these technologies beyond the realm of teaching, learning and assessment by considering prompt engineering skills, industry impact, curriculum changes, and the need for staff upskilling. In contrast, not engaging strategically with Generative AI poses risks, including falling behind peers, missed opportunities and failing to ensure our graduates remain employable. The rapid evolution of AI technologies necessitates a proactive and strategic approach if we are to remain relevant.
This slide is special for master students (MIBS & MIFB) in UUM. Also useful for readers who are interested in the topic of contemporary Islamic banking.
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Search engines, news aggregators and intermediaries
1. Summer School for Journalists
and Media Practitioners
Search engines, news aggregators
and intermediaries
Elda Brogi
Giovanni Gangemi
Summer School
Florence, EU (Sala Teatro)
14/05/2013
2. Intermediaries, who are they?
Internet intermediaries bring together or facilitate transactions between third
parties on the Internet. They
a) give access to,
b) host,
c) transmit
d) index
content, products and services originated by third parties on the Internet or
provide Internet-based services to third parties (OECD, 2010).
3. Intermediaries, who are they?
Internet access and service
providers
Web hosting
Search
engines and
portals
E-commerce
intermediari
es
News
aggregators
Social
networks
App stores
Third-party producers of content, products and services
Users or consumers of content, products and services
Payment
sysyems
4. Select and aggregate content according to neutral, automatic
systems
Aggregators
search engines
& portals
Participative
network plat.
App stores
Aid in creating content and social networking
Aid in navigation on the internet
electronic retailers for news content and apps
Web Hosting
Transform data prepare data for dissemination or store data or
content on the Internet of others
ISPs
Provide access to the internet to households, business and
government
E-commerce Enable online buying or selling
Intermediaries, what do they do?
Payment
systems
Process internet payments
7. Main features
Mere conduit
Caching
Hosting
Lack of editorial control
Neutrality
Automation
8. Lack of editorial control
Intermediaries do not have any control on content
No influence on timing the content is delivered (it depends on the users…)
No influence on the quality
No (direct) influence on the ranking (?)
9. Neutrality
Do they have too much judgment (designing algorithms, defining
customised results for users…)….
….or should they take more responsibility?
Is the lack of judgment a totally neutral approach? Or can it be considered
intentional?
Internet bias: can advertising affect the neutrality of intermediaries? (e.g.
TV)
10. Automation
Automation is when the conduit is merely technical and there is no human
intervention.
It occurs when there is a lack of knowledge or control on stored data
“Google would not permit any human editing to refine the results” (Randal
Stoss)
ISP have less opportunities to impose editorial control
11. Concerns about news intermediaries
Bottlenecks of distribution of news: intermediaries control the
way users can access to news
Control the
access to news
Selection /
influence news
agenda
Impact future
economic models
Influence
political agenda
The way these players may impact on news supply
The way intermediaries chose, select and promote news
(content) can influence the news agenda and the
newsworthiness criteria
The way they influence the political agenda as a result of the
role they play as distributors of news
12. News suppliers need intermediaries (?)
In the digital economy, profits can be generated only if there is a wide
market.
Intermediaries can play an important role for news suppliers because the
allow them to reach a wider audience
Intermediaries are becoming an increasingly important source of
information for news suppliers.
13. Business models of intermediaries
Intermediaries mainly base their business on advertising. Intermediaries
are typically two sided markets.
Advertising is the main source of revenues for search engines and social
networks
But revenues can be generated also using visibility to promote other
services (i.e. Google can give priority to its services, such as Maps, by
ranking them highly in the search results).
14. The offline news value chain
Photo &news
agencies
Journalists
photographer
Content
creation
RetailerPrinting Wholesaler Reader
Content creation Manufacturing Physical distribution
Advertiser
$
$
15. The online news value chain
Photo &news
agencies
Journalists
photographer
Content
creation
Aggregator
Wholesaler Reader
Advertiser
Content creation
Manufacturing /
Automation
Distribution
?$
$
?$
?$
16. Where is the advertising going?
0
1.000
2.000
3.000
4.000
5.000
6.000
7.000
8.000
2007 2008 2009 2010 2011
France Germany Italy Spain UK
Aggregators & search engines are boosting their revenues
Advertising on newspapers is dramatically dropping
What correlation between these two phenomena?
-
5.000
10.000
15.000
20.000
25.000
30.000
2007 2008 2009 2010 2011
million €
Google Facebook
Cagr: +26% Cagr: -8%
Aggregators, search engines, portals Newspapers’ advertising
17. The winner takes all
It is difficult to set competition within the intermediaries
Network effects: the more inclusive a social network is, the better it works
The bigger a search engine is, the largest number of search result it will
provide
Scales economies: intermediaries are based on technical tools (i.e.
algorithms) that can be used worldwide. Any additional can be added at no
additional cost
This makes markets very concentrated: Google is now 7 times bigger than
its competitor Yahoo!
18. The lack of investment in original content
Intermediaries, and in particular aggregators, seem not to be interested
in producing their own content and are rarely involved in content
production,
However, there is a difference between the ones who exert some form of
editorial control (e.g. Yahoo! News) and pure aggregators (e.g. Google).
These players challenge traditional media outlets moving online (BBC,
CNN, FOX…).
The lack of resources allocated in new content induces a systematic re-
use of existing content.
19. Some hints from a legal perspective
The directive on electronic commerce 2000/31/EC sets up an
Internal Market framework for electronic commerce
The directive sets some rules on liability of intermediaries
mere conduit
caching
hosting
20. E. commerce directive: mere conduit
Art 12 Where an information society service is provided that consists of the
transmission in a communication network of information provided by a
recipient of the service, or the provision of access to a communication
network, Member States shall ensure that the service provider is not liable
for the information transmitted, on condition that the provider:
(a) does not initiate the transmission;
(b) does not select the receiver of the transmission;
and (c) does not select or modify the information contained in the
transmission.
possibility for a court or administrative authority, in accordance with
Member States' legal systems, of requiring the service provider to terminate
or prevent an infringement.
21. E. commerce directive: caching
Art 13 service provider is not liable for the automatic, intermediate and temporary
storage of that information, performed for the sole purpose of making more efficient
the information's onward transmission to other recipients of the service upon their
request, on condition that:
(a) the provider does not modify the information;
(b) the provider complies with conditions on access to the information;
(c) the provider complies with rules regarding the updating of the information,
specified in a manner widely recognized and used by industry;
(d) the provider does not interfere with the lawful use of technology, widely
recognized and used by industry, to obtain data on the use of the information; and
(e) the provider acts expeditiously to remove or to disable access to the information
it has stored upon obtaining actual knowledge of the fact that the information at the
initial source of the transmission has been removed from the network, or access to it
has been disabled, or that a court or an administrative authority has ordered such
removal or disablement.
22. E. commerce directive: hosting
Art 14 Where an information society service is provided that consists of the storage of
information provided by a recipient of the service, Member States shall ensure that the
service provider is not liable for the information stored at the request of a recipient of
the service, on condition that:
(a) the provider does not have actual knowledge of illegal activity or information and, as
regards claims for damages, is not aware of facts or circumstances from which the
illegal activity or information is apparent; or
(b) the provider, upon obtaining such knowledge or awareness, acts expeditiously to
remove or to disable access to the information.
...
3. This Article shall not affect the possibility for a court or administrative authority, in
accordance with Member States' legal systems, of requiring the service provider to
terminate or prevent an infringement, nor does it affect the possibility for Member
States of establishing procedures governing the removal or disabling of access to
information.
23. No general obligation to monitor
Art 15 1. Member States shall not impose a general obligation on providers, when
providing the services covered by Articles 12, 13 and 14, to monitor the information
which they transmit or store, nor a general obligation actively to seek facts or
circumstances indicating illegal activity.
2. Member States may establish obligations for information society service providers
promptly to inform the competent public authorities of alleged illegal activities
undertaken or information provided by recipients of their service or obligations to
communicate to the competent authorities, at their request, information enabling
the identification of recipients of their service with whom they have storage
agreements.
24. Some cases of the CJEU on the role of ISPs:
2008 Promusicae-Telefonica Case C-275/06
The court held that European law does not require Internet service
providers (ISPs) to disclose their subscribers’ identities to trade
organizations for the purpose of civil litigation against them.
Confidentially obligation to be limited where this is necessary to protect the
rights and freedoms of others, including property rights in situations where
authors are seeking to obtain protection of such rights before the
competent courts. EU law does not preclude the possibility for the Member
States of laying down an obligation to disclose personal data in the context
of civil proceedings.
25. 2011 Sabam-Scarlett C-70/10
Case on the installation of a system for filtering electronic communications
in order to prevent file sharing which infringes copyright
No general obligation to monitor information transmitted. EU law
precludes a national court from ordering an ISP to install a general
filtering system with the aim of preventing the illegal downloading of files…
26. …
prohibition laid down in the E-Commerce Directive, under which national
authorities must not adopt measures which would require an internet
service provider to carry out general monitoring of the information that it
transmits on its network.
In this regard, the Court finds that the monitoring injunction in the case
between SABAM and Scarlet would require Scarlet to actively monitor all
the data relating to each of its customers in order to prevent any
infringement of intellectual property rights. Such a general monitoring
request is incompatible with the E-Commerce Directive and with the fact
that the right to intellectual property is not to be regarded as legally
absolute and inviolable.
27. Hybrids
Search engines, aggregators, social networks, apps...they fall under
the e.commerce directive
But they are “different” from “common” ISPs (?)
Are they totally “neutral”?
Do they “select” (and so have a sort of editorial control) on
contents?
28. 2012 Sabam-Netlog C-360/10 (“neutrality”)
Question raised: if it is consistent with European law a system for
filtering most of the information stored on Netlog servers in order to
identify files containing works in respect of which SABAM claims to
hold rights, and to block the exchange of such files.
The Court affirmed Netlog is a hosting service within the meaning of
article 14 of Directive 2000/31 as it stores information provided by
the users on its servers.
So, a social network falls under the e.commerce directive
29. Some argument against neutrality
EU opened an investigation on the way Google ranks and displays Internet-
search results and of its advertising contracts with other websites
Google proposals: Google has offered clearer labeling of results for its own
products, such as YouTube, Google Shopping and Google+, so that users
can distinguish them from other search results. Google also has been
accused of copying, or "scraping" content from rival websites, and it also
has proposed to give rivals an "opt-out" to prevent this from happening.
30. Some Italian courts have attempted to find Internet intermediaries liable for the content
that they or their services transmit, store, or even index.
the courts say that due to technological evolution, the activities of Internet providers
can be no longer in line with those codified by EU legislation and therefore the
system of liability exemptions therein contained needs to be re-interpreted.
new genus of services, somewhere in between hosting and directly offering content.
This new genus is not completely passive in the transmission of third parties’ content,
and does not limit its activity to offer the storage of memory, but, on the contrary,
has a specific role in organizing the content uploaded by users (revenue form
advertisements that link to the infringing content, even if uploaded by users, the
host can remove, according its terms and conditions of use, flagged contents. The
system used to be informed of the abuses is a way to have some kind of control on
the contents; the “suggested videos system” is an “editorial” service).
Those are “active hosting providers”
31. Conclusions (?)
Intermediaries are affecting the business model of “traditional players”
They offer new business models and business opportunities, but the are
also competitive for advertising revenues
The question about investment in original content is still open
Problems in defining neutral intermediaries and the scope of application of
the e.commerce directive
Need of a new regulation in between AVMSD and ECD?
case-by-case analysis has to be made to determine the liability of a ISP or
ISP-like?